Merge pull request #8169 from hashicorp/config-entry-ns

This commit is contained in:
Freddy 2020-06-23 11:15:23 -06:00 committed by freddygv
parent b2b2cedb06
commit fc1baf2223
6 changed files with 64 additions and 9 deletions

View File

@ -12,10 +12,10 @@ import (
func (s *HTTPServer) parseEntMeta(req *http.Request, entMeta *structs.EnterpriseMeta) error { func (s *HTTPServer) parseEntMeta(req *http.Request, entMeta *structs.EnterpriseMeta) error {
if headerNS := req.Header.Get("X-Consul-Namespace"); headerNS != "" { if headerNS := req.Header.Get("X-Consul-Namespace"); headerNS != "" {
return BadRequestError{Reason: "Invalid header: \"X-Consul-Namespace\" - Namespaces is a Consul Enterprise feature"} return BadRequestError{Reason: "Invalid header: \"X-Consul-Namespace\" - Namespaces are a Consul Enterprise feature"}
} }
if queryNS := req.URL.Query().Get("ns"); queryNS != "" { if queryNS := req.URL.Query().Get("ns"); queryNS != "" {
return BadRequestError{Reason: "Invalid query parameter: \"ns\" - Namespaces is a Consul Enterprise feature"} return BadRequestError{Reason: "Invalid query parameter: \"ns\" - Namespaces are a Consul Enterprise feature"}
} }
return nil return nil
} }
@ -36,7 +36,7 @@ func (s *HTTPServer) rewordUnknownEnterpriseFieldError(err error) error {
switch quotedField { switch quotedField {
case `"Namespace"`: case `"Namespace"`:
return fmt.Errorf("%v - Namespaces is a Consul Enterprise feature", err) return fmt.Errorf("%v - Namespaces are a Consul Enterprise feature", err)
} }
} }
@ -47,7 +47,7 @@ func (s *HTTPServer) addEnterpriseHTMLTemplateVars(vars map[string]interface{})
func parseACLAuthMethodEnterpriseMeta(req *http.Request, _ *structs.ACLAuthMethodEnterpriseMeta) error { func parseACLAuthMethodEnterpriseMeta(req *http.Request, _ *structs.ACLAuthMethodEnterpriseMeta) error {
if methodNS := req.URL.Query().Get("authmethod-ns"); methodNS != "" { if methodNS := req.URL.Query().Get("authmethod-ns"); methodNS != "" {
return BadRequestError{Reason: "Invalid query parameter: \"authmethod-ns\" - Namespaces is a Consul Enterprise feature"} return BadRequestError{Reason: "Invalid query parameter: \"authmethod-ns\" - Namespaces are a Consul Enterprise feature"}
} }
return nil return nil

View File

@ -306,8 +306,10 @@ func DecodeConfigEntry(raw map[string]interface{}) (ConfigEntry, error) {
} }
for _, k := range md.Unused { for _, k := range md.Unused {
switch k { switch {
case "CreateIndex", "ModifyIndex": case k == "CreateIndex" || k == "ModifyIndex":
case strings.HasSuffix(strings.ToLower(k), "namespace"):
err = multierror.Append(err, fmt.Errorf("invalid config key %q, namespaces are a consul enterprise feature", k))
default: default:
err = multierror.Append(err, fmt.Errorf("invalid config key %q", k)) err = multierror.Append(err, fmt.Errorf("invalid config key %q", k))
} }

View File

@ -86,6 +86,59 @@ func TestDecodeConfigEntry(t *testing.T) {
}, },
}, },
}, },
{
name: "namespaces invalid top level",
snake: `
kind = "terminating-gateway"
name = "terminating-gateway"
namespace = "foo"
`,
camel: `
Kind = "terminating-gateway"
Name = "terminating-gateway"
Namespace = "foo"
`,
expectErr: `invalid config key "namespace", namespaces are a consul enterprise feature`,
},
{
name: "namespaces invalid deep",
snake: `
kind = "ingress-gateway"
name = "ingress-web"
listeners = [
{
port = 8080
protocol = "http"
services = [
{
name = "web"
hosts = ["test.example.com", "test2.example.com"]
namespace = "frontend"
},
]
}
]
`,
camel: `
Kind = "ingress-gateway"
Name = "ingress-web"
Namespace = "blah"
Listeners = [
{
Port = 8080
Protocol = "http"
Services = [
{
Name = "web"
Hosts = ["test.example.com", "test2.example.com"]
Namespace = "frontend"
},
]
},
]
`,
expectErr: `invalid config key "listeners[0].services[0].namespace", namespaces are a consul enterprise feature`,
},
{ {
name: "service-defaults", name: "service-defaults",
snake: ` snake: `

View File

@ -50,7 +50,7 @@ type ACLToken struct {
Rules string `json:",omitempty"` Rules string `json:",omitempty"`
// Namespace is the namespace the ACLToken is associated with. // Namespace is the namespace the ACLToken is associated with.
// Namespaces is a Consul Enterprise feature. // Namespaces are a Consul Enterprise feature.
Namespace string `json:",omitempty"` Namespace string `json:",omitempty"`
} }

View File

@ -79,7 +79,7 @@ func (f *HTTPFlags) NamespaceFlags() *flag.FlagSet {
fs.Var(&f.namespace, "namespace", fs.Var(&f.namespace, "namespace",
"Specifies the namespace to query. If not provided, the namespace will be inferred "+ "Specifies the namespace to query. If not provided, the namespace will be inferred "+
"from the request's ACL token, or will default to the `default` namespace. "+ "from the request's ACL token, or will default to the `default` namespace. "+
"Namespaces is a Consul Enterprise feature.") "Namespaces are a Consul Enterprise feature.")
return fs return fs
} }

View File

@ -1 +1 @@
- `-namespace=<string>` - Specifies the namespace to query. If not provided, the namespace will be inferred from the request's ACL token, or will default to the `default` namespace. Namespaces is a Consul Enterprise feature added in v1.7.0. - `-namespace=<string>` - Specifies the namespace to query. If not provided, the namespace will be inferred from the request's ACL token, or will default to the `default` namespace. Namespaces are a Consul Enterprise feature added in v1.7.0.